Austin Bomber update

Kinja'd!!! "mkbruin, Atlas VP" (mkbruin)
03/21/2018 at 13:32 • Filed to: None

Kinja'd!!!1 Kinja'd!!! 13

Interesting information coming out....

1) exotic batteries. Okay, that’s easy enough to track. But the next one...

2) “One more detail from NBC: “Police were able to find Conditt using a variety of tactics, including coming up with a list of phone numbers and individuals that were in the area of the bombings when they occurred, using cell-site analysis and high-tech computing systems that can find patterns of callers in certain areas.” If you’re a true-crime fan, you know that it never ceases to amaze how many premeditated murderers forget to leave their phones at home after springing their plot, knowing full well that the cops can triangulate location from cell-phone towers. The bomber apparently turned his phone on hours before the cops caught up to him last night, helping them zero in on where he was.”

This is pretty cool. Analyzing cell data from all carriers looking for an overlap of a specific cell phone at or near all of the bombings. Locate a cell that matches them all, then track the cell to locate the per. Extremely high tech stuff here...... HOWEVER, how on Earth did the feds get access to THAT MUCH data so quickly, and exactly how much computing power would be needed to filter and analyze that data set. This is some next level Patriot Act secret Bush-era NSA cell phone warrantless tapping nanny state-ing going on here. Not that I’m complaining, it allowed them to find this phycho...


DISCUSSION (13)


Kinja'd!!! crowmolly > mkbruin, Atlas VP
03/21/2018 at 13:47

Kinja'd!!!2

Life is a compromise.

On one hand you have possible government overreach and on the other you have psychos running around unchecked.


Kinja'd!!! DipodomysDeserti > mkbruin, Atlas VP
03/21/2018 at 13:52

Kinja'd!!!2

They’ve been doing similar things in Iraq for well over a decade in order to predict attacks and find people. The successful insurgents (the ones still alive with political positions) switched to hand written notes a while ago to counteract this. Also, their most likely bullshitting on the techniques they used to track him.

It’s pretty nuts. I had a roommate in college who was a military linguist. There’s a lot of shit going on in regards to surveillance both home and abroad that goes well beyond a lot of the stuff revealed by Snowden or Wikileaks.


Kinja'd!!! Azrek > mkbruin, Atlas VP
03/21/2018 at 13:53

Kinja'd!!!4

Excel spreadsheet. Delete duplicates. Copy tab to other tab. Delete Singular Number reports. Compare...



Kinja'd!!! Wacko > mkbruin, Atlas VP
03/21/2018 at 13:55

Kinja'd!!!1

they been doing stuff like that for years on shows like NCIS, CSI and criminal minds.


Kinja'd!!! haveacarortwoorthree2 > mkbruin, Atlas VP
03/21/2018 at 13:58

Kinja'd!!!2

I suspect its pretty easy to get a judge to sign off on a subpoena when someone is randomly bombing people in a city, and the threat of disclosing that one of the cell or tower companies is blocking the cops from finding the bomber is a pretty good incentive to get them to cooperate.


Kinja'd!!! For Sweden > mkbruin, Atlas VP
03/21/2018 at 13:59

Kinja'd!!!6

how on Earth did the feds get access to THAT MUCH data so quickly, and exactly how much computing power would be needed to filter and analyze that data set

[Laughs in FBI]


Kinja'd!!! wafflesnfalafel > mkbruin, Atlas VP
03/21/2018 at 14:01

Kinja'd!!!0

Once they had a viable number/cell phone it’s just one call to a judge - and I’m guessing it was not hard to convince him or her of the urgency of the matter. But getting that number just using data crunching the cell data? That is pretty amazing.


Kinja'd!!! user314 > Wacko
03/21/2018 at 14:02

Kinja'd!!!4

Kinja'd!!!

Kinja'd!!!


Kinja'd!!! fintail > mkbruin, Atlas VP
03/21/2018 at 14:03

Kinja'd!!!0

Good data scientists can do a lot in a little time. A subpoena would probably be available in an instant in such a case, too.


Kinja'd!!! gawdzillla > DipodomysDeserti
03/21/2018 at 14:23

Kinja'd!!!0

they went back to using pigeons ?


Kinja'd!!! DipodomysDeserti > gawdzillla
03/21/2018 at 14:29

Kinja'd!!!0

In some cases. There have been recent stories about ISIS rounding up and killing Iraqi pigeon breeders after determing pigeon keeping was unIslamic.


Kinja'd!!! f86sabre > mkbruin, Atlas VP
03/21/2018 at 15:10

Kinja'd!!!2

I’m a firm believer that when they find people who do crap like this they should have no name. His name is all over major media outlets now. It just emboldens other notoriety seaking nut jobs. Just call him Asshole.

As far as the day tech goes, in the modern world, there are so many ways tech shows where you are that it is hard to hide. I image they could do what they did with cell phones with any car that has wireless connectivity as well.


Kinja'd!!! Tekamul > mkbruin, Atlas VP
03/21/2018 at 15:24

Kinja'd!!!1

Processing the data probably did not take that much power. You can run analysis on billions of points of data of a laptop if you format it well.

As for access to the data, The silent, unabated flow of data between the FBI and telecoms is more than a decade old at this point. The unencrypted portions like device ID don’t require warrants, as they are commercially available.

You could do the same work at home with a license of SAS, a PC and a customer account with Verizon.

Or just pay these people to do it for you : http://www.thebridgecorp.com/mobile-d evice-id/

Edited to clarify : They needed a warrant to get the name attached to the device ID, but nothing to get to the point of narrowing down the device IDs.